<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-song-lake-ra-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="RA-EDHOC">Remote attestation over EDHOC</title>
    <seriesInfo name="Internet-Draft" value="draft-song-lake-ra-02"/>
    <author initials="Y." surname="Song" fullname="Yuxuan Song">
      <organization>Inria</organization>
      <address>
        <email>yuxuan.song@inria.fr</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <workgroup>Lightweight Authenticated Key Exchange</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>This document specifies how to perform remote attestation as part of the lightweight authenticated Diffie-Hellman key exchange protocol EDHOC (Ephemeral Diffie-Hellman Over COSE), based on the Remote ATtestation procedureS (RATS) architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ysong02.github.io/RemoteAttestation_overEDHOC/draft-song-lake-ra.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-song-lake-ra/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Lightweight Authenticated Key Exchange Working Group mailing list (<eref target="mailto:lake@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/lake/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ysong02/RemoteAttestation_overEDHOC"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <!--Discuss remote attestation and mention some use cases.-->
<t>Remote attestation is a security process which verifies and confirms the integrity and trustworthiness of a remote device or system in the network.
This process helps establish a level of trust in the remote system before allowing the device to e.g. join the network or get access to some sensitive information and resources.
The use cases that require remote attestation include secure boot and firmware management, cloud computing, network access control, etc.</t>
      <!--Summarize RATS architecture {{RFC9334}} and main roles.-->
<t>The IETF working group Remote ATtestation procedureS (RATS) has defined an architecture <xref target="RFC9334"/> for remote attestation.
The three main roles in the RATS architecture are the Attester, the Verifier and the Relying Party.
The Attester generates the evidence concerning its identity and integrity, which must be appraised by the Verifier for its validity.
Then, the Verifier produces the attestation result, which is consequently used by the Relying Party for the purposes of reliably applying application-specific actions.</t>
      <!--Discuss the two RATS models and say that this specification supports both models.-->
<t>One type of interaction model defined in the RATS architecture is called the background-check model.
It resembles the procedure of how employers perform background checks to determine the prospective employee's trustworthiness, by contacting the respective organization that issues a report.
In this case, the employer acts as the Relying Party, the employee acts as the Attester and the organization acts as the Verifier.
The Attester conveys evidence directly to the Relying Party and the Relying Party forwards the evidence to the Verifier for appraisal.
Once the attestation result is computed by the Verifier, it is sent back to the Relying Party to decide what action to take based on the attestation result.
Another model is called passport model, where the Attester communicates directly with the Verifier.
The Attester presents the evidence to the Verifier and gets an attestation result from the Verifier.
Then the Attester conveys the attestation result to the Relying Party.
This specification employs both the RATS background-check model and the passport model.</t>
      <t>This document specifies the protocol between the Attester and the Relying Party.
The details of the protocol between the Relying Party and the Verifier in the background-check model, and the protocol between the Attester and the Verifier in the passport model are out of the scope.
This communication may be secured through protocols such as EDHOC, TLS or other security protocols that support the secure transmission to and from the Verifier.</t>
      <!--Discuss EAT-->
<t>One way of conveying attestation evidence or the attestation result is the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>.
It provides an attested claims set which can be used to determine a level of trustworthiness.
This specification relies on the EAT as the format for attestation evidence and the attestation result.</t>
      <!--Summarize EDHOC {{RFC9528}}. Mention EAD fields of EDHOC.-->
<t>Ephemeral Diffie-Hellman over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol for highly constrained networks.
In EDHOC, the two parties involved in the key exchange are referred to as the Initiator (I) and the Responder (R).
EDHOC supports the transport of external authorization data, through the dedicated EAD fields.
This specification delivers EAT through EDHOC.
Specifically, EAT is transported as an EAD item.
This specification also defines new EAD items needed to perform remote attesation over EDHOC in <xref target="ead-bg"/> and <xref target="ead-pp"/>.</t>
      <!--Discuss implementation aspects such as the internal attestation service running on the Attester.
Root of trust. Separation between secure and non-secure worlds.-->
<t>For the generation of evidence, the Attester incorporates an internal attestation service, including a specific trusted element known as the "root of trust".
Root of trust serves as the starting point for establishing and validating the trustworthiness appraisals of other components on the system.
The measurements signed by the attestation service are referred to as the Evidence.
The signing is requested through an attestation API.
How the components are separated between the secure and non-secure worlds on a device is out of scope of this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The reader is assumed to be familiar with the terms and concepts defined in EDHOC <xref target="RFC9528"/> and RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>This specification describes how to perform remote attestation over the EDHOC protocol, following the RATS architecture.
EDHOC provides the benefit of minimal message overhead and reduced round trips for a lightweight authentication.
More importantly, by integrating remote attestation with EDHOC, attestation can be run in parallel with authentication, improving the efficiency and maintaining lightweight properties.</t>
      <t>Remote attestation protocol elements are carried within EDHOC's External Authorization Data (EAD) fields.
EDHOC <xref target="RFC9528"/> supports one or more EAD items in each EAD field.</t>
      <t>In <xref target="attestation-dimensions"/>, this document defines three independent dimensions for performing remote attestation over EDHOC:</t>
      <ol spacing="normal" type="1"><li>
          <t>Target (see <xref target="targets"/>) defining the entity that undergoes the attestation process (IoT device or network service).</t>
        </li>
        <li>
          <t>Model (see <xref target="models"/>) defining the attestation model in use based on the RATS architecture (background-check model or passport model).</t>
        </li>
        <li>
          <t>Message Flow (see <xref target="flow"/>) defining the EDHOC message flow in use (forward message flow or reverse message flow).</t>
        </li>
      </ol>
      <t>This document specifies the cases that are suited for constrained IoT environments.</t>
      <t>EDITOR NOTE: add an overview figure</t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <t>In background-check model, one assumption is that the Verifier outputs a fresh nonce and that same nonce is passed on to the EDHOC session.
The Verifier is assumed to know how to verify multiple formats of the evidence type.
This specification assumes that the Relying Party also has knowledge about the Attester, so it can narrow down the evidence type selection and send to the Attester only one format of the evidence type.
The Attester should have an explicit relation with the Verifier, such as from device manufacturing, so that the Verifier can evaluate the Evidence that is produced by the Attester.</t>
      <t>In the passport model, the credential identity of the Verifier is assumed to be stored at the Attester and the Relying Party, which means the Verifier is trusted by the Attester and the Relying Party to obtain the attestation result.</t>
      <t>EDITOR NOTE: add attestation public key stored in Verifier</t>
    </section>
    <section anchor="attestation-dimensions">
      <name>Remote Attestation in EDHOC</name>
      <t>This section specifies three independent dimensions that characterize the remote attestation process over EDHOC.</t>
      <section anchor="targets">
        <name>Target</name>
        <t>Defines the entity that undergoes the attestation process.</t>
        <section anchor="iot-device-attestation-iot">
          <name>IoT Device Attestation (IoT)</name>
          <t>The IoT device acts as the Attester.</t>
        </section>
        <section anchor="network-service-attestation-net">
          <name>Network Service Attestation (Net)</name>
          <t>The network service acts as the Attester.</t>
          <t>Unlike IoT devices, network services typically have more computational power and capabilities, enabling them to handle complex attestation processes when more demanding tasks are required of the Attester.</t>
        </section>
      </section>
      <section anchor="models">
        <name>Model</name>
        <t>Defines the attestation models based on RATS architecture.
This specification supports both the RATS background-check model (see <xref target="bg"/>) and the passport model (see <xref target="pp"/>).
The corresponding EAD items for background-check model and the passport model are independent of each other.
The EAD items are specified in <xref target="ead-bg"/> for the background-check model and in <xref target="ead-pp"/> for the passport model.</t>
        <section anchor="bg">
          <name>Background-check Model (BG)</name>
          <t>In the background-check model, the Attester sends the evidence to the Relying Party.
The Relying Party transfers the evidence to the Verifier and gets back the attestation result from the Verifier.</t>
          <t>An EDHOC session is established between the Attester and the Relying Party.
A negotiation of the evidence type is required before the Attester sends the evidence.
All three parties must agree on a selected evidence type.</t>
          <t>The Attester first sends a list of the proposed evidence types to the Relying Party.
The list is formatted as an Attestation proposal in an EDHOC EAD item.
The Relying Party relays the list to the Verifier and receives at least one supported evidence type from the Verifier in return.
If the Relying Party receives more than one evidence type, a single evidence type should be selected by the Relying Party based on its knowledge of the Attester.
The Relying Party then sends it back within the Attestation request to the Attester.</t>
          <t>A nonce, at least 8-bytes long <xref target="I-D.ietf-rats-eat"/>), guarantees the freshness of the attestation session.
The nonce is generated by the Verifier and sent to the Relying Party.
The Relying Party puts the nonce and the selected evidence type together in a tuple to generate an Attestation request.</t>
          <t>Once the Attester receives the Attestation request, it can call its attestation service to generate the evidence, with the nonce value as one of the inputs.</t>
          <section anchor="ead-bg">
            <name>External Authorization Data (EAD) Items for background-check model</name>
            <t>EAD items that are used for the background-check model are defined in this section.</t>
            <section anchor="attestation-proposal">
              <name>Attestation_proposal</name>
              <t>To propose a list of provided evidence types in background-check model, the Attester transports the Proposed_EvidenceType object.
It signals to the Relying Party the proposal to do remote attestation, as well as which types of the attestation claims the Attester supports.
The Proposed_EvidenceType is encoded in CBOR in the form of a sequence.</t>
              <t>The EAD item for an attestation proposal is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD1</t>
                </li>
                <li>
                  <t>ead_value = Attestation_proposal, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Attestation_proposal = bstr .cbor Proposed_EvidenceType

Proposed_EvidenceType = [ + content-format ]

content-format = uint
]]></artwork>
              <t>where</t>
              <ul spacing="normal">
                <li>
                  <t>Proposed_EvidenceType is an array that contains all the supported evidence types by the Attester.</t>
                </li>
                <li>
                  <t>There <bcp14>MUST</bcp14> be at least one item in the array.</t>
                </li>
                <li>
                  <t>content-format is an indicator of the format type (e.g., application/eat+cwt with an appropriate eat_profile parameter set), from <xref target="IANA-CoAP-Content-Formats"/>.</t>
                </li>
              </ul>
              <t>The sign of ead_label TBD1 <bcp14>MUST</bcp14> be negative to indicate that the EAD item is critical.
If the receiver cannot recognize the critical EAD item, or cannot process the information in the critical EAD item, then the receiver <bcp14>MUST</bcp14> send an EDHOC error message back as defined in <xref section="6" sectionFormat="of" target="RFC9528"/>.</t>
            </section>
            <section anchor="attestation-request">
              <name>Attestation_request</name>
              <t>As a response to the attestation proposal, the Relying Party signals to the Attester the supported and requested evidence type.
In case none of the evidence types is supported, the Relying Party rejects the first message_1 with an error indicating support for another evidence type.</t>
              <t>The EAD item for an attestation request is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD1</t>
                </li>
                <li>
                  <t>ead_value = Attestation_request, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Attestation_request = bstr .cbor Selected_EvidenceType

Selected_EvidenceType = (
  content-format: uint,
  nonce: bstr .size 8..64
)
]]></artwork>
              <t>where</t>
              <ul spacing="normal">
                <li>
                  <t>content-format is the selected evidence type by the Relying Party and supported by the Verifier.</t>
                </li>
                <li>
                  <t>nonce is generated by the Verifier and forwarded by the Relying Party.</t>
                </li>
              </ul>
              <t>The sign of ead_label TBD2 <bcp14>MUST</bcp14> be negative to indicate that the EAD item is critical.
If the receiver cannot recognize the critical EAD item, or cannot process the information in the critical EAD item, then the receiver <bcp14>MUST</bcp14> send an EDHOC error message back as defined in <xref section="6" sectionFormat="of" target="RFC9528"/>.</t>
            </section>
            <section anchor="evidence">
              <name>Evidence</name>
              <t>As a response to the attestation request, the Attester calls its local attestation service to generate and return the serialized EAT <xref target="I-D.ietf-rats-eat"/> as Evidence.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD1</t>
                </li>
                <li>
                  <t>ead_value is a serialized EAT.</t>
                </li>
              </ul>
              <t>EAT is specified in <xref target="I-D.ietf-rats-eat"/>.</t>
            </section>
            <section anchor="trigger-bg">
              <name>trigger_bg</name>
              <t>The EAD item trigger_bg is used when the sender triggers the receiver to start a remote attestation in the background-check model.
The receiver <bcp14>MUST</bcp14> reply with an EAD item corresponding to the background-check model.
The ead_value can be empty, as the ead_label serves as the trigger.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD2</t>
                </li>
                <li>
                  <t>ead_value = null</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="pp">
          <name>Passport Model (PP)</name>
          <t>In the passport model, the Attester sends the evidence to the Verifier.
After the Attester receives the attestation result from the Verifier, the Attester sends the attestation result to the Relying Party.</t>
          <t>An EDHOC session is established between the Attester and the Relying Party.
The Attester and the Relying Party should decide from which Verifier the Attester obtains the attestation result and transfers it to the Relying Party.
The Attester first sends a list of the Verifier identities that it can get the attestation result.
The Relying Party selects one trusted Verifier identity and sends it back as a Result request.</t>
          <t>Regarding the freshness in passport model, the Attester could either establish a real-time connection with the selected Verifier, or use a pre-stored attestation result from the selected Verifier.
If the attestation result is not obtained via a real-time connection, it should include a time stamp and/or expiry time to indicate its validity.
Time synchronization is out of scope of this specification.</t>
          <t>Once the Attester obtains the attestation result from the selected Verifier, it sends the attestation result to the Relying Party.</t>
          <section anchor="ead-pp">
            <name>External Authorization Data (EAD) Items for passport model</name>
            <t>EAD items that are used for the passport model are defined in this section.</t>
            <section anchor="result-proposal">
              <name>Result_proposal</name>
              <t>An attestation result proposal contains the identification of the credentials of the Verifiers to indicate Verifiers' indentities.
The identification of credentials relies on COSE header parameters <xref target="IANA-COSE-Header-Parameters"/>, with a header label and credential value.</t>
              <t>The EAD item for the attestation result proposal is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD3</t>
                </li>
                <li>
                  <t>ead_value = Result_proposal, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Result_proposal = bstr .cbor Proposed_VerifierIdentity
Proposed_VerifierIdentity = [ + VerifierIdentity ]

VerifierIdentity = {
  label => values
}
]]></artwork>
              <t>where</t>
              <ul spacing="normal">
                <li>
                  <t>Proposed_VerifierIdentity is defined as a list of one or more VerifierIdentity elements.</t>
                </li>
                <li>
                  <t>Each VerifierIdentity within the list is a map defined in <xref target="IANA-COSE-Header-Parameters"/> that:
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>label = int / tstr</t>
                    </li>
                    <li>
                      <t>values = any</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </section>
            <section anchor="result-request">
              <name>Result_request</name>
              <t>As a response to the attestation result proposal, the Relying Party signals to the Attester the trusted Verifier.
In case none of the Verifiers can be trusted by the Relying Party, the session is aborted.
Relying Party generates a nonce to ensure the freshness of the attestation result from the Verifier.</t>
              <t>The EAD item for an attestation result request is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD3</t>
                </li>
                <li>
                  <t>ead_value = Result_request, which is a CBOR byte string:</t>
                </li>
              </ul>
              <artwork><![CDATA[
Result_request = bstr .cbor Request_structure

Request_structure = {
  selected_verifier: VerfierIdentity
}
]]></artwork>
            </section>
            <section anchor="result">
              <name>Result</name>
              <t>The attestation result is generated and signed by the Verifier as a serialized EAT <xref target="I-D.ietf-rats-eat"/>.
The Relying Party can decide what action to take with regards to the Attester based on the information elements in attetation result.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD3</t>
                </li>
                <li>
                  <t>ead_value is a serialized EAT.</t>
                </li>
              </ul>
            </section>
            <section anchor="trigger-pp">
              <name>trigger_pp</name>
              <t>The EAD item trigger_pp is used when the sender triggers the receiver to start a remote attestation in the passport model.
The receiver <bcp14>MUST</bcp14> reply with an EAD item correspondign to the passport model.
The ead_value can be empty, as the ead_label serves as the trigger.</t>
              <t>The EAD item is:</t>
              <ul spacing="normal">
                <li>
                  <t>ead_label = TBD4</t>
                </li>
                <li>
                  <t>ead_value = null</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
      </section>
      <section anchor="flow">
        <name>EDHOC Message Flow</name>
        <t>The EDHOC protocol defines two possible message flows, namely the EDHOC forward message flow and the EDHOC reverse message flow (see <xref section="A.2.2" sectionFormat="of" target="RFC9528"/>).
In this specification, both flows can be used to perform remote attestation.</t>
        <section anchor="edhoc-forward-message-flow-fwd">
          <name>EDHOC Forward Message Flow (Fwd)</name>
          <t>In forward message flow, EDHOC may run with the Initiator as a CoAP/HTTP client.
Remote attestation over EDHOC starts with a POST requests to the Uri-Path: "/.well-known/lake-ra".</t>
        </section>
        <section anchor="edhoc-reverse-message-flow-rev">
          <name>EDHOC Reverse Message Flow (Rev)</name>
          <t>In the reverse message flow, the CoAP/HTTP client is the Responder and the server is the Initiator.
A new EDHOC session begins with an empty POST request to the server's resource for EDHOC.</t>
        </section>
      </section>
    </section>
    <section anchor="attestation-combinations">
      <name>Instantiation of Remote Attestation Protocol</name>
      <t>We use the format (Target, Model, Message Flow) to denote instantiations.
For example, (IoT, BG, Fwd) represents IoT device attestation using the background-check model with forward EDHOC message flow.</t>
      <t>Although there are 8 cases (IoT/Net, BG/PP, Fwd/Rev), this document specifies the most relevant instantiations for constrained IoT environments.</t>
      <section anchor="iot-bg-fwd-iot-device-attestation">
        <name>(IoT, BG, Fwd): IoT Device Attestation</name>
        <t>A common use case for (IoT, BG, Fwd) is to attest an IoT device to a network server.
For example, doing remote attestation to verify that the latest version of firmware is running on the IoT device before the network server allows it to join the network (see <xref target="firmware"/>).</t>
        <t>An overview of doing IoT device attestation in background-check model and EDHOC forward message flow is established in <xref target="fig-iot-bg-fwd"/>.
EDHOC Initiator plays the role of the RATS Attester (A).
EDHOC Responder plays the role of the RATS Relying Party (RP).
The Attester and the Relying Party communicate by transporting messages within EDHOC's External Authorization Data (EAD) fields.
An external entity, out of scope of this specification, plays the role of the RATS Verifier (V).
The EAD items specific to the background-check model are defined in <xref target="ead-bg"/>.</t>
        <t>The Attester starts the attestation by sending an Attestation proposal in EDHOC message_1.
The Relying Party generates EAD_2 with the received evidence type and nonce from the Verifier, and sends it to the Attester.
The Attester sends the Evidence to the Relying Party in EAD_3.
The Verifier evaluates the Evidence and sends the Attestation result to the Relying Party.</t>
        <figure anchor="fig-iot-bg-fwd">
          <name>Overview of IoT device attestation in background-check model and EDHOC forward message flow. EDHOC is used between A and RP.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="616" viewBox="0 0 616 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,496" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,128" fill="none" stroke="black"/>
                <path d="M 344,128 L 344,496" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,128" fill="none" stroke="black"/>
                <path d="M 520,96 L 520,128" fill="none" stroke="black"/>
                <path d="M 568,128 L 568,496" fill="none" stroke="black"/>
                <path d="M 608,96 L 608,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 272,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 416,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 272,96 L 416,96" fill="none" stroke="black"/>
                <path d="M 520,96 L 608,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 272,128 L 416,128" fill="none" stroke="black"/>
                <path d="M 520,128 L 608,128" fill="none" stroke="black"/>
                <path d="M 80,176 L 336,176" fill="none" stroke="black"/>
                <path d="M 344,224 L 560,224" fill="none" stroke="black"/>
                <path d="M 352,240 L 568,240" fill="none" stroke="black"/>
                <path d="M 88,304 L 344,304" fill="none" stroke="black"/>
                <path d="M 80,352 L 336,352" fill="none" stroke="black"/>
                <path d="M 344,384 L 560,384" fill="none" stroke="black"/>
                <path d="M 352,400 L 568,400" fill="none" stroke="black"/>
                <path d="M 96,480 L 328,480" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="568,384 556,378.4 556,389.6" fill="black" transform="rotate(0,560,384)"/>
                <polygon class="arrowhead" points="568,224 556,218.4 556,229.6" fill="black" transform="rotate(0,560,224)"/>
                <polygon class="arrowhead" points="360,400 348,394.4 348,405.6" fill="black" transform="rotate(180,352,400)"/>
                <polygon class="arrowhead" points="360,240 348,234.4 348,245.6" fill="black" transform="rotate(180,352,240)"/>
                <polygon class="arrowhead" points="344,352 332,346.4 332,357.6" fill="black" transform="rotate(0,336,352)"/>
                <polygon class="arrowhead" points="344,176 332,170.4 332,181.6" fill="black" transform="rotate(0,336,176)"/>
                <polygon class="arrowhead" points="336,480 324,474.4 324,485.6" fill="black" transform="rotate(0,328,480)"/>
                <polygon class="arrowhead" points="104,480 92,474.4 92,485.6" fill="black" transform="rotate(180,96,480)"/>
                <polygon class="arrowhead" points="96,304 84,298.4 84,309.6" fill="black" transform="rotate(180,88,304)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="312" y="52">Network</text>
                  <text x="376" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="304" y="84">EDHOC</text>
                  <text x="368" y="84">Responder</text>
                  <text x="84" y="116">Attester</text>
                  <text x="320" y="116">Relying</text>
                  <text x="376" y="116">Party</text>
                  <text x="564" y="116">Verifier</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="208" y="164">Attestation</text>
                  <text x="292" y="164">proposal</text>
                  <text x="400" y="212">Attestation</text>
                  <text x="488" y="212">proposal,</text>
                  <text x="544" y="212">C_R</text>
                  <text x="428" y="260">EvidenceType(s),</text>
                  <text x="520" y="260">Nonce</text>
                  <text x="120" y="292">EAD_2</text>
                  <text x="152" y="292">=</text>
                  <text x="208" y="292">Attestation</text>
                  <text x="288" y="292">request</text>
                  <text x="120" y="340">EAD_3</text>
                  <text x="152" y="340">=</text>
                  <text x="196" y="340">Evidence</text>
                  <text x="432" y="372">Evidence,</text>
                  <text x="488" y="372">C_R</text>
                  <text x="424" y="420">Attestation</text>
                  <text x="500" y="420">result</text>
                  <text x="176" y="500">EDHOC</text>
                  <text x="232" y="500">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+              +-----------------+
|   IoT device    |              | Network service |
+-----------------+              +-----------------+
| EDHOC Initiator |              | EDHOC Responder |
+-----------------+              +-----------------+            +----------+
|     Attester    |              |  Relying Party  |            | Verifier |
+--------+--------+              +--------+--------+            +-----+----+
         |                                |                           |
         |  EAD_1 = Attestation proposal  |                           |
         +------------------------------->|                           |
         |                                |                           |
         |                                | Attestation proposal, C_R |
         |                                +-------------------------->|
         |                                |<--------------------------+
         |                                |  EvidenceType(s), Nonce   |
         |                                |                           |
         |  EAD_2 = Attestation request   |                           |
         |<-------------------------------+                           |
         |                                |                           |
         |  EAD_3 = Evidence              |                           |
         +------------------------------->|                           |
         |                                |      Evidence, C_R        |
         |                                +-------------------------->|
         |                                |<--------------------------+
         |                                |    Attestation result     |
         |                                |                           |
         |                                |                           |
         |                                |                           |
         | <----------------------------> |                           |
         |         EDHOC session          |                           |

]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="net-pp-fwd-network-service-attestation">
        <name>(Net, PP, Fwd): Network Service Attestation</name>
        <t>One use case for (Net, PP, Fwd) is when a network server needs to attest itself to a client (e.g., an IoT device).
For example, the client needs to send some sensitive data to the network server, which requires the network server to be attested first.
In (Net, PP, Fwd), the network server acts as an Attester and the client acts as a Relying Party.</t>
        <t>An overview of the message flow is illustrated in <xref target="fig-net-pp-fwd"/>.
EDHOC Initiator plays the role of the RATS Relying Party.
EDHOC Responder plays the role of the RATS Attester.
An external entity, out of scope of this specification, plays the role of the RATS Verifier.
The EAD items specific to the passport model are defined in <xref target="ead-pp"/>.</t>
        <t>The Relying Party asks the Attester to do a remote attestation by sending a trigger_pp (see <xref target="trigger-pp"/>) in EDHOC message_1.
The Attester replies to the Relying Party with a Result proposal in EAD_2.
Then the Relying Party selects a trusted Verifier identity and sends it as a Result request.
How the Attester negotiates with the selected Verifier to get the attestation result is out of scope of this specification.
A fourth EDHOC message is required to send the Result from the Attester to the Relying Party.</t>
        <figure anchor="fig-net-pp-fwd">
          <name>Overview of network service attestation in passport model and EDHOC forward message flow. EDHOC is used between RP and A. The dashed line illustrates a logical connection that does not need to occur in real time.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="584" viewBox="0 0 584 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,432" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 240,32 L 240,128" fill="none" stroke="black"/>
                <path d="M 312,128 L 312,432" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,128" fill="none" stroke="black"/>
                <path d="M 488,96 L 488,128" fill="none" stroke="black"/>
                <path d="M 536,128 L 536,432" fill="none" stroke="black"/>
                <path d="M 576,96 L 576,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 240,32 L 384,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 240,64 L 384,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 240,96 L 384,96" fill="none" stroke="black"/>
                <path d="M 488,96 L 576,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 240,128 L 384,128" fill="none" stroke="black"/>
                <path d="M 488,128 L 576,128" fill="none" stroke="black"/>
                <path d="M 80,176 L 304,176" fill="none" stroke="black"/>
                <path d="M 88,224 L 312,224" fill="none" stroke="black"/>
                <path d="M 80,272 L 304,272" fill="none" stroke="black"/>
                <path d="M 312,288 L 336,288" fill="none" stroke="black"/>
                <path d="M 360,288 L 376,288" fill="none" stroke="black"/>
                <path d="M 400,288 L 416,288" fill="none" stroke="black"/>
                <path d="M 440,288 L 456,288" fill="none" stroke="black"/>
                <path d="M 480,288 L 496,288" fill="none" stroke="black"/>
                <path d="M 512,288 L 528,288" fill="none" stroke="black"/>
                <path d="M 320,304 L 344,304" fill="none" stroke="black"/>
                <path d="M 368,304 L 384,304" fill="none" stroke="black"/>
                <path d="M 408,304 L 424,304" fill="none" stroke="black"/>
                <path d="M 448,304 L 464,304" fill="none" stroke="black"/>
                <path d="M 480,304 L 496,304" fill="none" stroke="black"/>
                <path d="M 520,304 L 536,304" fill="none" stroke="black"/>
                <path d="M 88,352 L 312,352" fill="none" stroke="black"/>
                <path d="M 96,416 L 296,416" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="536,288 524,282.4 524,293.6" fill="black" transform="rotate(0,528,288)"/>
                <polygon class="arrowhead" points="328,304 316,298.4 316,309.6" fill="black" transform="rotate(180,320,304)"/>
                <polygon class="arrowhead" points="312,272 300,266.4 300,277.6" fill="black" transform="rotate(0,304,272)"/>
                <polygon class="arrowhead" points="312,176 300,170.4 300,181.6" fill="black" transform="rotate(0,304,176)"/>
                <polygon class="arrowhead" points="304,416 292,410.4 292,421.6" fill="black" transform="rotate(0,296,416)"/>
                <polygon class="arrowhead" points="104,416 92,410.4 92,421.6" fill="black" transform="rotate(180,96,416)"/>
                <polygon class="arrowhead" points="96,352 84,346.4 84,357.6" fill="black" transform="rotate(180,88,352)"/>
                <polygon class="arrowhead" points="96,224 84,218.4 84,229.6" fill="black" transform="rotate(180,88,224)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="280" y="52">Network</text>
                  <text x="344" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="272" y="84">EDHOC</text>
                  <text x="336" y="84">Responder</text>
                  <text x="56" y="116">Relying</text>
                  <text x="112" y="116">Party</text>
                  <text x="316" y="116">Attester</text>
                  <text x="532" y="116">Verifier</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="204" y="164">trigger_PP</text>
                  <text x="120" y="212">EAD_2</text>
                  <text x="152" y="212">=</text>
                  <text x="188" y="212">Result</text>
                  <text x="252" y="212">proposal</text>
                  <text x="120" y="260">EAD_3</text>
                  <text x="152" y="260">=</text>
                  <text x="188" y="260">Result</text>
                  <text x="248" y="260">request</text>
                  <text x="416" y="276">(request)</text>
                  <text x="412" y="324">Result</text>
                  <text x="120" y="340">EAD_4</text>
                  <text x="152" y="340">=</text>
                  <text x="188" y="340">Result</text>
                  <text x="160" y="436">EDHOC</text>
                  <text x="216" y="436">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+          +-----------------+
|   IoT device    |          | Network service |
+-----------------+          +-----------------+
| EDHOC Initiator |          | EDHOC Responder |
+-----------------+          +-----------------+            +----------+
|  Relying Party  |          |     Attester    |            | Verifier |
+--------+--------+          +--------+--------+            +-----+----+
         |                            |                           |
         |  EAD_1 = trigger_PP        |                           |
         +--------------------------->|                           |
         |                            |                           |
         |  EAD_2 = Result proposal   |                           |
         |<---------------------------+                           |
         |                            |                           |
         |  EAD_3 = Result request    |                           |
         +--------------------------->|        (request)          |
         |                            +---  ---  ---  ---  --- -->|
         |                            |<---  ---  ---  --- ---  --+
         |                            |         Result            |
         |  EAD_4 = Result            |                           |
         |<---------------------------+                           |
         |                            |                           |
         |                            |                           |
         |                            |                           |
         | <------------------------> |                           |
         |       EDHOC session        |                           |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="mutual-attestation">
      <name>Mutual Attestation in EDHOC</name>
      <t>Mutual attestation over EDHOC combines the cases where one of the EDHOC parties uses the IoT device attestation and the other uses the Network service attestation.
Performing mutual attestation to a single EDHOC message flow acheives a lightweight use with reduced message overhead.
Note that the message flow for the two parties in mutual attestation needs to be the same.</t>
      <t>In this specification, we list the most relevant mutual attestation example for constrained IoT environments.</t>
      <section anchor="iot-bg-fwd-net-pp-fwd">
        <name>(IoT, BG, Fwd) - (Net, PP, Fwd)</name>
        <t>In this example, the mutual attestation is performed in EDHOC forward message flow, by one IoT device attestation in background-check model and another network service attestation in passport model.
The process is illustrated in <xref target="fig-mutual-attestation-BP"/>.
How the Network service connects with the Verifier_1 and potential Verifier_2 is out of scope in this specification.</t>
        <t>The first remote attestation is initiated by the IoT device (A_1) in background-check model.
In parallel, the IoT device (A_1) requests the network service (A_2) to perform a remote attestation in passport model.
EAD_2 carries the EAD items Attestation request and Result proposal.
EAD_3 carries the EAD items Evidence and Result request.
EAD_4 carries the EAD item Result for the passport model.</t>
        <figure anchor="fig-mutual-attestation-BP">
          <name>Overview of mutual attestation of (IoT, BG, Fwd) - (Net, PP, Fwd). EDHOC is used between A and RP. The dashed line illustrates a logical connection that does not need to occur in real time.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="864" viewBox="0 0 864 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,128" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,720" fill="none" stroke="black"/>
                <path d="M 152,32 L 152,128" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,128" fill="none" stroke="black"/>
                <path d="M 352,128 L 352,720" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,128" fill="none" stroke="black"/>
                <path d="M 528,96 L 528,128" fill="none" stroke="black"/>
                <path d="M 584,128 L 584,720" fill="none" stroke="black"/>
                <path d="M 632,96 L 632,128" fill="none" stroke="black"/>
                <path d="M 752,96 L 752,128" fill="none" stroke="black"/>
                <path d="M 808,128 L 808,720" fill="none" stroke="black"/>
                <path d="M 856,96 L 856,128" fill="none" stroke="black"/>
                <path d="M 8,32 L 152,32" fill="none" stroke="black"/>
                <path d="M 280,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 152,64" fill="none" stroke="black"/>
                <path d="M 280,64 L 424,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 152,96" fill="none" stroke="black"/>
                <path d="M 280,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 528,96 L 632,96" fill="none" stroke="black"/>
                <path d="M 752,96 L 856,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 152,128" fill="none" stroke="black"/>
                <path d="M 280,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 528,128 L 632,128" fill="none" stroke="black"/>
                <path d="M 752,128 L 856,128" fill="none" stroke="black"/>
                <path d="M 80,192 L 344,192" fill="none" stroke="black"/>
                <path d="M 352,256 L 576,256" fill="none" stroke="black"/>
                <path d="M 360,272 L 584,272" fill="none" stroke="black"/>
                <path d="M 88,336 L 352,336" fill="none" stroke="black"/>
                <path d="M 80,416 L 344,416" fill="none" stroke="black"/>
                <path d="M 352,464 L 576,464" fill="none" stroke="black"/>
                <path d="M 352,480 L 376,480" fill="none" stroke="black"/>
                <path d="M 392,480 L 408,480" fill="none" stroke="black"/>
                <path d="M 424,480 L 440,480" fill="none" stroke="black"/>
                <path d="M 456,480 L 472,480" fill="none" stroke="black"/>
                <path d="M 488,480 L 504,480" fill="none" stroke="black"/>
                <path d="M 520,480 L 536,480" fill="none" stroke="black"/>
                <path d="M 560,480 L 584,480" fill="none" stroke="black"/>
                <path d="M 600,480 L 616,480" fill="none" stroke="black"/>
                <path d="M 640,480 L 656,480" fill="none" stroke="black"/>
                <path d="M 680,480 L 696,480" fill="none" stroke="black"/>
                <path d="M 712,480 L 728,480" fill="none" stroke="black"/>
                <path d="M 744,480 L 760,480" fill="none" stroke="black"/>
                <path d="M 776,480 L 800,480" fill="none" stroke="black"/>
                <path d="M 360,544 L 584,544" fill="none" stroke="black"/>
                <path d="M 360,576 L 384,576" fill="none" stroke="black"/>
                <path d="M 408,576 L 424,576" fill="none" stroke="black"/>
                <path d="M 448,576 L 464,576" fill="none" stroke="black"/>
                <path d="M 488,576 L 504,576" fill="none" stroke="black"/>
                <path d="M 528,576 L 544,576" fill="none" stroke="black"/>
                <path d="M 568,576 L 584,576" fill="none" stroke="black"/>
                <path d="M 600,576 L 616,576" fill="none" stroke="black"/>
                <path d="M 640,576 L 656,576" fill="none" stroke="black"/>
                <path d="M 680,576 L 696,576" fill="none" stroke="black"/>
                <path d="M 712,576 L 728,576" fill="none" stroke="black"/>
                <path d="M 752,576 L 768,576" fill="none" stroke="black"/>
                <path d="M 784,576 L 808,576" fill="none" stroke="black"/>
                <path d="M 88,624 L 352,624" fill="none" stroke="black"/>
                <path d="M 96,704 L 336,704" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="808,480 796,474.4 796,485.6" fill="black" transform="rotate(0,800,480)"/>
                <polygon class="arrowhead" points="584,464 572,458.4 572,469.6" fill="black" transform="rotate(0,576,464)"/>
                <polygon class="arrowhead" points="584,256 572,250.4 572,261.6" fill="black" transform="rotate(0,576,256)"/>
                <polygon class="arrowhead" points="368,576 356,570.4 356,581.6" fill="black" transform="rotate(180,360,576)"/>
                <polygon class="arrowhead" points="368,544 356,538.4 356,549.6" fill="black" transform="rotate(180,360,544)"/>
                <polygon class="arrowhead" points="368,272 356,266.4 356,277.6" fill="black" transform="rotate(180,360,272)"/>
                <polygon class="arrowhead" points="352,416 340,410.4 340,421.6" fill="black" transform="rotate(0,344,416)"/>
                <polygon class="arrowhead" points="352,192 340,186.4 340,197.6" fill="black" transform="rotate(0,344,192)"/>
                <polygon class="arrowhead" points="344,704 332,698.4 332,709.6" fill="black" transform="rotate(0,336,704)"/>
                <polygon class="arrowhead" points="104,704 92,698.4 92,709.6" fill="black" transform="rotate(180,96,704)"/>
                <polygon class="arrowhead" points="96,624 84,618.4 84,629.6" fill="black" transform="rotate(180,88,624)"/>
                <polygon class="arrowhead" points="96,336 84,330.4 84,341.6" fill="black" transform="rotate(180,88,336)"/>
                <g class="text">
                  <text x="48" y="52">IoT</text>
                  <text x="92" y="52">device</text>
                  <text x="320" y="52">Network</text>
                  <text x="384" y="52">service</text>
                  <text x="40" y="84">EDHOC</text>
                  <text x="104" y="84">Initiator</text>
                  <text x="312" y="84">EDHOC</text>
                  <text x="376" y="84">Responder</text>
                  <text x="76" y="116">A_1/RP_2</text>
                  <text x="348" y="116">RP_1/A_2</text>
                  <text x="580" y="116">Verifier_1</text>
                  <text x="804" y="116">Verifier_2</text>
                  <text x="120" y="164">EAD_1</text>
                  <text x="152" y="164">=</text>
                  <text x="208" y="164">Attestation</text>
                  <text x="296" y="164">proposal,</text>
                  <text x="204" y="180">trigger_PP</text>
                  <text x="416" y="244">Attestation</text>
                  <text x="504" y="244">proposal,</text>
                  <text x="560" y="244">C_R</text>
                  <text x="444" y="292">EvidenceType(s),</text>
                  <text x="536" y="292">Nonce</text>
                  <text x="120" y="308">EAD_2</text>
                  <text x="152" y="308">=</text>
                  <text x="208" y="308">Attestation</text>
                  <text x="292" y="308">request,</text>
                  <text x="188" y="324">Result</text>
                  <text x="252" y="324">proposal</text>
                  <text x="120" y="388">EAD_3</text>
                  <text x="152" y="388">=</text>
                  <text x="200" y="388">Evidence,</text>
                  <text x="188" y="404">Result</text>
                  <text x="248" y="404">request</text>
                  <text x="448" y="452">Evidence,</text>
                  <text x="504" y="452">C_R</text>
                  <text x="696" y="468">(Request)</text>
                  <text x="432" y="532">Attestation</text>
                  <text x="508" y="532">result</text>
                  <text x="476" y="596">Result</text>
                  <text x="120" y="612">EAD_4</text>
                  <text x="152" y="612">=</text>
                  <text x="188" y="612">Result</text>
                  <text x="184" y="724">EDHOC</text>
                  <text x="240" y="724">session</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------+               +-----------------+
|   IoT device    |               | Network service |
+-----------------+               +-----------------+
| EDHOC Initiator |               | EDHOC Responder |
+-----------------+               +-----------------+            +------------+              +------------+
|    A_1/RP_2     |               |    RP_1/A_2     |            | Verifier_1 |              | Verifier_2 |
+--------+--------+               +--------+--------+            +------+-----+              +------+-----+
         |                                 |                            |                           |
         |  EAD_1 = Attestation proposal,  |                            |                           |
         |          trigger_PP             |                            |                           |
         +-------------------------------->|                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |  Attestation proposal, C_R |                           |
         |                                 +--------------------------->|                           |
         |                                 |<---------------------------+                           |
         |                                 |   EvidenceType(s), Nonce   |                           |
         |  EAD_2 = Attestation request,   |                            |                           |
         |          Result proposal        |                            |                           |
         |<--------------------------------+                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |  EAD_3 = Evidence,              |                            |                           |
         |          Result request         |                            |                           |
         +-------------------------------->|                            |                           |
         |                                 |                            |                           |
         |                                 |       Evidence, C_R        |                           |
         |                                 +--------------------------->|         (Request)         |
         |                                 +--- --- --- --- --- ---  ---+ ---  ---  --- --- --- --->|
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |    Attestation result      |                           |
         |                                 |<---------------------------+                           |
         |                                 |                            |                           |
         |                                 |<---  ---  ---  ---  ---  --+ ---  ---  --- ---  --- ---+
         |                                 |            Result          |                           |
         |  EAD_4 = Result                 |                            |                           |
         |<--------------------------------+                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         |                                 |                            |                           |
         | <-----------------------------> |                            |                           |
         |          EDHOC session          |                            |                           |

]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>This section specifies a new EDHOC error code and how it is used in the proposed protocol.</t>
      <section anchor="edhoc-error-attestation-failed">
        <name>EDHOC Error "Attestation failed"</name>
        <t>This section specifies a new EDHOC error "Attestation failed".
The format of the error message follows the one in EDHOC protocol(see <xref section="6" sectionFormat="of" target="RFC9528"/>).</t>
        <figure anchor="fig-error">
          <name>EDHOC error code and error information for Attestation failed.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="568" viewBox="0 0 568 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
                <path d="M 232,32 L 232,96" fill="none" stroke="black"/>
                <path d="M 560,32 L 560,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 560,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 560,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 560,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 560,96" fill="none" stroke="black"/>
                <g class="text">
                  <text x="52" y="52">ERR_CODE</text>
                  <text x="140" y="52">ERR_INFO</text>
                  <text x="196" y="52">Type</text>
                  <text x="288" y="52">Description</text>
                  <text x="68" y="84">TBD5</text>
                  <text x="152" y="84">attestation</text>
                  <text x="288" y="84">Attestation</text>
                  <text x="364" y="84">failed</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------+----------------+----------------------------------------+
| ERR_CODE | ERR_INFO Type  | Description                            |
+==========+================+========================================+
|     TBD5 | attestation    | Attestation failed                     |
+----------+----------------+----------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <t>Error code TBD5 indicates to the receiver that the remote attestation is failed after the evidence is sent.
This can occur in two cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Verifier evaluates the attestation evidence and returns a negative result based on the Verifier's appraisal policy.</t>
          </li>
          <li>
            <t>The Verifier provides a positive attestation result to the Relying Party, but the Relying Party can not establish a sufficient level of trust to proceed decision-specific actions based on its appraisal policy.</t>
          </li>
        </ol>
        <t>In case 1, the Verifier signals the error to the Relying Party, which then generates an EDHOC "Attestation failed" error and send it to the Attester.
In case 2, the Relying Party directly generates and sends the "Attestation failed" error to the Attester.
The application decides how to handle the error message.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification is performed over EDHOC <xref target="RFC9528"/> by using EDHOC's EAD fields.
The privacy considerations of EADs in EDHOC apply to this specification.</t>
      <t>EAD_1 is not resistant to either active attackers or passive attackers, because neither the Initiator nor the Responder has been authenticated.</t>
      <t>Although EAD_2 is encrypted, the Initiator has not been authenticated, rendering EAD_2 vulnerable against the active attackers.</t>
      <t>The ead items in EAD_1 and EAD_2 <bcp14>MAY</bcp14> be very specific and potentially reveal sensitive information about the device.
The leaking of the data in EAD_1 and/or EAD_2 <bcp14>MAY</bcp14> risk to be used by the attackers for malicious purposes.
Data in EAD_3 and EAD_4 are protected between the Initiator and the Responder in EDHOC.</t>
      <t>Mutual attestation carries a lower risk for EAD items when the Responder is the Attester.
For the mutual attestation at the EDHOC Responder, only the Attestation_proposal/Result_proposal in EAD_2 is not protected to active attackers.
Both the Attestation_request/Result_request in EAD_3 and the Evidence/Result in EAD_4 are protected.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="edhoc-external-authorization-data-registry">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is requested to register the following entry in the "EDHOC External Authorization Data" registry under the group name "Ephemeral Diffie-Hellman Over Cose (EDHOC)".</t>
        <ul spacing="normal">
          <li>
            <t>The ead_label = TBD1 corresponds to the ead_value Attestation_proposal in <xref target="attestation-proposal"/>, Attestation_request in <xref target="attestation-request"/> and Evidence in <xref target="evidence"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD2 corresponds to the EAT item trigger_bg as specified in <xref target="trigger-bg"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD3 corresponds to the ead_value Result_proposal in <xref target="result-proposal"/>, Result_request in <xref target="result-request"/> and the Result in <xref target="result"/>.</t>
          </li>
          <li>
            <t>The ead_label = TBD4 corresponds to the EAT item trigger_pp as specified in <xref target="trigger-pp"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-ead-labels">
          <name>EAD labels.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="536" viewBox="0 0 536 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 104,32 L 104,256" fill="none" stroke="black"/>
                <path d="M 168,32 L 168,256" fill="none" stroke="black"/>
                <path d="M 368,32 L 368,256" fill="none" stroke="black"/>
                <path d="M 528,32 L 528,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 528,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 528,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 528,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 528,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 528,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 528,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 528,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Name</text>
                  <text x="136" y="52">Label</text>
                  <text x="224" y="52">Description</text>
                  <text x="416" y="52">Reference</text>
                  <text x="32" y="84">TBD</text>
                  <text x="132" y="84">TBD1</text>
                  <text x="188" y="84">BG</text>
                  <text x="224" y="84">model</text>
                  <text x="208" y="100">related</text>
                  <text x="288" y="100">information</text>
                  <text x="408" y="100">Section</text>
                  <text x="472" y="100">5.2.1.1</text>
                  <text x="32" y="132">TBD</text>
                  <text x="132" y="132">TBD2</text>
                  <text x="208" y="132">trigger</text>
                  <text x="252" y="132">to</text>
                  <text x="288" y="132">start</text>
                  <text x="224" y="148">attestation</text>
                  <text x="284" y="148">in</text>
                  <text x="308" y="148">BG</text>
                  <text x="404" y="148">Secion</text>
                  <text x="464" y="148">5.2.1.1</text>
                  <text x="32" y="180">TBD</text>
                  <text x="132" y="180">TBD3</text>
                  <text x="188" y="180">PP</text>
                  <text x="224" y="180">model</text>
                  <text x="208" y="196">related</text>
                  <text x="288" y="196">information</text>
                  <text x="408" y="196">Section</text>
                  <text x="472" y="196">5.2.2.1</text>
                  <text x="32" y="228">TBD</text>
                  <text x="132" y="228">TBD4</text>
                  <text x="208" y="228">trigger</text>
                  <text x="252" y="228">to</text>
                  <text x="288" y="228">start</text>
                  <text x="224" y="244">attestation</text>
                  <text x="284" y="244">in</text>
                  <text x="308" y="244">PP</text>
                  <text x="404" y="244">Secion</text>
                  <text x="464" y="244">5.2.2.1</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+-----------+-------+------------------------+-------------------+
| Name      | Label | Description            | Reference         |
+===========+=======+========================+===================+
| TBD       | TBD1  | BG model               |                   |
|           |       | related information    | Section 5.2.1.1   |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD2  | trigger to start       |                   |
|           |       | attestation in BG      | Secion 5.2.1.1    |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD3  | PP model               |                   |
|           |       | related information    | Section 5.2.2.1   |
+-----------+-------+------------------------+-------------------+
| TBD       | TBD4  | trigger to start       |                   |
|           |       | attestation in PP      | Secion 5.2.2.1    |
+-----------+-------+------------------------+-------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="IANA.CWT.Claims" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA-CoAP-Content-Formats" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>CoAP Content-Formats</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Geovane Fedrecheski" initials="G." surname="Fedrecheski">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight
   authenticated key exchange protocol intended for use in constrained
   scenarios.  This document specifies Lightweight Authorization using
   EDHOC (ELA).  The procedure allows authorizing enrollment of new
   devices using the extension point defined in EDHOC.  ELA is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-authz-03"/>
        </reference>
        <reference anchor="IANA-COSE-Header-Parameters" target="https://www.iana.org/cose/header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 639?>

<section anchor="example-remote-attestation-flow">
      <name>Example: Remote Attestation Flow</name>
      <figure anchor="_figure-iot-example">
        <name>Example of remote attestation.</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="992" width="576" viewBox="0 0 576 992" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 32,112 L 32,976" fill="none" stroke="black"/>
              <path d="M 136,72 L 136,104" fill="none" stroke="black"/>
              <path d="M 168,112 L 168,976" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,112" fill="none" stroke="black"/>
              <path d="M 288,48 L 288,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 368,976" fill="none" stroke="black"/>
              <path d="M 440,352 L 440,360" fill="none" stroke="black"/>
              <path d="M 448,48 L 448,112" fill="none" stroke="black"/>
              <path d="M 480,80 L 480,112" fill="none" stroke="black"/>
              <path d="M 528,112 L 528,976" fill="none" stroke="black"/>
              <path d="M 568,80 L 568,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 288,48 L 448,48" fill="none" stroke="black"/>
              <path d="M 8,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 288,80 L 448,80" fill="none" stroke="black"/>
              <path d="M 480,80 L 568,80" fill="none" stroke="black"/>
              <path d="M 8,112 L 224,112" fill="none" stroke="black"/>
              <path d="M 288,112 L 448,112" fill="none" stroke="black"/>
              <path d="M 480,112 L 568,112" fill="none" stroke="black"/>
              <path d="M 168,240 L 360,240" fill="none" stroke="black"/>
              <path d="M 368,288 L 520,288" fill="none" stroke="black"/>
              <path d="M 376,400 L 528,400" fill="none" stroke="black"/>
              <path d="M 176,480 L 368,480" fill="none" stroke="black"/>
              <path d="M 40,560 L 168,560" fill="none" stroke="black"/>
              <path d="M 32,624 L 160,624" fill="none" stroke="black"/>
              <path d="M 168,704 L 360,704" fill="none" stroke="black"/>
              <path d="M 368,800 L 520,800" fill="none" stroke="black"/>
              <path d="M 376,864 L 528,864" fill="none" stroke="black"/>
              <path d="M 368,880 L 392,880" fill="none" stroke="black"/>
              <path d="M 376,912 L 392,912" fill="none" stroke="black"/>
              <path d="M 176,960 L 360,960" fill="none" stroke="black"/>
              <path d="M 392,880 C 400.83064,880 408,887.16936 408,896" fill="none" stroke="black"/>
              <path d="M 392,912 C 400.83064,912 408,904.83064 408,896" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="528,800 516,794.4 516,805.6" fill="black" transform="rotate(0,520,800)"/>
              <polygon class="arrowhead" points="528,288 516,282.4 516,293.6" fill="black" transform="rotate(0,520,288)"/>
              <polygon class="arrowhead" points="384,912 372,906.4 372,917.6" fill="black" transform="rotate(180,376,912)"/>
              <polygon class="arrowhead" points="384,864 372,858.4 372,869.6" fill="black" transform="rotate(180,376,864)"/>
              <polygon class="arrowhead" points="384,400 372,394.4 372,405.6" fill="black" transform="rotate(180,376,400)"/>
              <polygon class="arrowhead" points="368,960 356,954.4 356,965.6" fill="black" transform="rotate(0,360,960)"/>
              <polygon class="arrowhead" points="368,704 356,698.4 356,709.6" fill="black" transform="rotate(0,360,704)"/>
              <polygon class="arrowhead" points="368,240 356,234.4 356,245.6" fill="black" transform="rotate(0,360,240)"/>
              <polygon class="arrowhead" points="184,960 172,954.4 172,965.6" fill="black" transform="rotate(180,176,960)"/>
              <polygon class="arrowhead" points="184,480 172,474.4 172,485.6" fill="black" transform="rotate(180,176,480)"/>
              <polygon class="arrowhead" points="168,624 156,618.4 156,629.6" fill="black" transform="rotate(0,160,624)"/>
              <polygon class="arrowhead" points="48,560 36,554.4 36,565.6" fill="black" transform="rotate(180,40,560)"/>
              <g class="text">
                <text x="72" y="52">EDHOC</text>
                <text x="136" y="52">Initiator</text>
                <text x="328" y="68">EDHOC</text>
                <text x="392" y="68">Responder</text>
                <text x="64" y="84">Attestation</text>
                <text x="180" y="84">Attester</text>
                <text x="48" y="100">Service</text>
                <text x="336" y="100">Relying</text>
                <text x="392" y="100">Party</text>
                <text x="524" y="100">Verifier</text>
                <text x="192" y="164">EDHOC</text>
                <text x="256" y="164">message_1</text>
                <text x="208" y="180">{...}</text>
                <text x="212" y="196">EAD_1(</text>
                <text x="252" y="212">types(a,b,c)</text>
                <text x="192" y="228">)</text>
                <text x="432" y="276">types(a,b,c),</text>
                <text x="504" y="276">C_R</text>
                <text x="400" y="340">Body:</text>
                <text x="432" y="340">{</text>
                <text x="416" y="356">nonce</text>
                <text x="200" y="372">EDHOC</text>
                <text x="264" y="372">message_2</text>
                <text x="436" y="372">types(a,b)</text>
                <text x="208" y="388">{...}</text>
                <text x="384" y="388">}</text>
                <text x="212" y="404">EAD_2(</text>
                <text x="228" y="420">nonce,</text>
                <text x="232" y="436">type(a)</text>
                <text x="192" y="452">)</text>
                <text x="260" y="468">Auth_CRED(Sig/MAC)</text>
                <text x="84" y="500">Body:{</text>
                <text x="92" y="516">nonce,</text>
                <text x="96" y="532">type(a)</text>
                <text x="64" y="548">}</text>
                <text x="68" y="580">Body:{</text>
                <text x="92" y="596">Evidence</text>
                <text x="48" y="612">}</text>
                <text x="200" y="644">EDHOC</text>
                <text x="264" y="644">message_3</text>
                <text x="208" y="660">{...}</text>
                <text x="240" y="676">Evidence(EAT)</text>
                <text x="260" y="692">Auth_CRED(sig/MAC)</text>
                <text x="400" y="772">Body:</text>
                <text x="432" y="772">{</text>
                <text x="404" y="788">EAT,</text>
                <text x="444" y="788">C_R}</text>
                <text x="400" y="820">Body:</text>
                <text x="432" y="820">{</text>
                <text x="432" y="836">att-result:</text>
                <text x="500" y="836">AR{}</text>
                <text x="384" y="852">}</text>
                <text x="444" y="900">verify</text>
                <text x="492" y="900">AR{}</text>
                <text x="248" y="948">application</text>
                <text x="316" y="948">data</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.--------------------------.
|     EDHOC Initiator      |       .-------------------.
+--------------------------+       |  EDHOC Responder  |
| Attestation   | Attester |       +-------------------+   .----------.
| Service       |          |       |  Relying Party    |   | Verifier |
'--+----------------+------'       '---------+---------'   '-----+----'
   |                |                        |                   |
   |                |                        |                   |
   |                |EDHOC message_1         |                   |
   |                |  {...}                 |                   |
   |                |  EAD_1(                |                   |
   |                |    types(a,b,c)        |                   |
   |                |  )                     |                   |
   |                +----------------------->|                   |
   |                |                        |                   |
   |                |                        | types(a,b,c), C_R |
   |                |                        +------------------>|
   |                |                        |                   |
   |                |                        |                   |
   |                |                        | Body: {           |
   |                |                        |   nonce,          |
   |                | EDHOC message_2        |   types(a,b)      |
   |                |  {...}                 | }                 |
   |                |  EAD_2(                |<------------------+
   |                |    nonce,              |                   |
   |                |    type(a)             |                   |
   |                |  )                     |                   |
   |                |  Auth_CRED(Sig/MAC)    |                   |
   |                |<-----------------------+                   |
   |   Body:{       |                        |                   |
   |    nonce,      |                        |                   |
   |    type(a)     |                        |                   |
   |   }            |                        |                   |
   |<---------------+                        |                   |
   | Body:{         |                        |                   |
   |   Evidence     |                        |                   |
   | }              |                        |                   |
   +--------------->|                        |                   |
   |                | EDHOC message_3        |                   |
   |                |  {...}                 |                   |
   |                |  Evidence(EAT)         |                   |
   |                |  Auth_CRED(sig/MAC)    |                   |
   |                +----------------------->|                   |
   |                |                        |                   |
   |                |                        |                   |
   |                |                        |                   |
   |                |                        | Body: {           |
   |                |                        |  EAT, C_R}        |
   |                |                        +------------------>|
   |                |                        | Body: {           |
   |                |                        |  att-result: AR{} |
   |                |                        | }                 |
   |                |                        |<------------------+
   |                |                        +---.               |
   |                |                        |    | verify AR{}  |
   |                |                        |<--'               |
   |                |                        |                   |
   |                |    application data    |                   |
   |                |<---------------------->|                   |
   |                |                        |                   |
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="remote-attestation-in-parallel-with-enrollment-authorization">
      <name>Remote attestation in parallel with enrollment authorization</name>
      <t>This section discusses the possibility of doing remote attestation in parallel with the enrollment authorization procedure defined in <xref target="I-D.ietf-lake-authz"/>.
In this case, the message count is much decreased.</t>
      <t>The detailed procedure is TBD.</t>
    </section>
    <section anchor="firmware">
      <name>Example: Firmware Version</name>
      <t>The goal in this example is to verify that the firmware running on the device is the latest version, and is neither tampered or compromised.
A device acts as the Attester, currently in an untrusted state.
The Attester needs to generate the evidence to attest itself.
A gateway that can communicate with the Attester and can control its access to the network acts as the Relying Party.
The gateway will finally decide whether the device can join the network or not depending on the attestation result.
The attestation result is produced by the Verifier, which is a web server that can be seen as the manufacturer of the device.
Therefore it can appraise the evidence that is sent by the Attester.
The remote attestation session starts with the Attester sending EAD_1 in EDHOC message 1.</t>
      <t>An example of the EAD_1 in EDHOC message_1 could be:</t>
      <artwork><![CDATA[
[60,61,258]
]]></artwork>
      <t>If the Verifier and the Relying Party can support at least one evidence type that is proposed by the Attester, the Relying Party will include in the EAD_2 field the same evidence type, alongside a nonce for message freshness.</t>
      <artwork><![CDATA[
(258, h'a29f62a4c6cdaae5')
]]></artwork>
      <t>The Evidence in EAD_3 field is an Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>, with the measurements claim formatted in CoSWID<xref target="RFC9393"/>.
The components of the Evidence should at least be:</t>
      <artwork><![CDATA[
{
/eat-nonce/                 10: h'a29f62a4c6cdaae5',
/ueid/                      256: 'aaabbcc',
/measurements/              273: [
  /CoAP Content-Format ID/        [ 258,
  /evidence in CoSWID/              {
                                      0: 'tagID'             /tag-id/
                                      12: 0                  /tag-version/
                                      1: "DotBot firmware"   /software-name/
                                      2: {                   /entity/
                                          31: "Attester"     /entity-name/
                                          33: 1              /role, must be "tag-creator" which is 1/
                                          },
                                      3: {                   /evidence/
                                          17: [              /file/
                                               {
                                                24: "partition0-nrf52840dk.bin",   /fs-name/
                                                7: [                               /hash of file/
                                                    1,                             /alg SHA-256/
                                                    h'06294f6806b9c685eea795048579cfd02a0c025bc8b5abca42a19ea0ec23e81a'
                                                    ]                              /hash value/
                                                }
                                               ]
                                          }
                                    }
                                  ]
                                 ]
}
]]></artwork>
      <t>The infomation above serves as the payload of the COSE object.
The complete resulting COSE object is:</t>
      <artwork><![CDATA[
18([
    /*protected header*/
    h'a10127',

    /*unprotected header*/
    {},

    /*payload*/
    h'A30A48A29F62A4C6CDAAE519010047616161626263631901118182190102A50045746
    16749440C00016F446F74426F74206669726D7761726502A2181F684174746573746572
    18210103A11181A218187819706172746974696F6E302D6E72663532383430646B2E626
    96E078201582006294F6806B9C685EEA795048579CFD02A0C025BC8B5ABCA42A19EA0EC
    23E81A',

    /*signature*/
    h'd4100901f4c3e51312c3110c6ddc8dcf7f68d8f5d3791c19133f2f0ac158c1f5ee6ed
    afe9d7c3d6eb3d2d197f82e733d375fdda9fb258b304961dfc38558950d'
])
]]></artwork>
      <t>which has the following base16 encoding:</t>
      <artwork><![CDATA[
D28443A10127A05890A30A48A29F62A4C6CDAAE51901004761616162626363190111818
2190102A5004574616749440C00016F446F74426F74206669726D7761726502A2181F68
417474657374657218210103A11181A218187819706172746974696F6E302D6E7266353
2383430646B2E62696E078201582006294F6806B9C685EEA795048579CFD02A0C025BC8
B5ABCA42A19EA0EC23E81A5840D4100901F4C3E51312C3110C6DDC8DCF7F68D8F5D3791
C19133F2F0AC158C1F5EE6EDAFE9D7C3D6EB3D2D197F82E733D375FDDA9FB258B304961
DFC38558950D
]]></artwork>
      <t>The Relying Party (co-located with the gateway) then treats the Evidence as opaque and sends it to the Verifier.
Once the Verifier sends back the Attestation Result, the Relying Party can be assured on the version of the firmware that the device is running.</t>
    </section>
    <section anchor="open-discussion-remote-attestation-over-edhoc-over-oscore">
      <name>Open discussion: remote attestation over EDHOC/ over OSCORE</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank Thomas Fossati, Goran Selander, Malisa Vucinic, Ionut Mihalcea, Muhammad Usama Sardar, Michael Richardson and Geovane Fedrecheski for the provided ideas and feedback.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
